Home Page Icon
Home Page
Table of Contents for
PART I: Securing the Infrastructure
Close
PART I: Securing the Infrastructure
by Donald Short, Philip Craig, Christopher Grow, Charles J. Brooks
Cybersecurity Essentials
COVER
ACKNOWLEDGMENTS
ABOUT THE AUTHORS
INTRODUCTION
Who Should Read This Book
What Is Covered in This Book
The Essentials Series
How to Contact the Author
PART I: Securing the Infrastructure
CHAPTER 1: Infrastructure Security in the Real World
Security Challenges
Summary
CHAPTER 2: Understanding Access-Control and Monitoring Systems
A Quick Primer on Infrastructure Security
Access Control
Security Policies
Physical Security Controls
Access-Control Gates
Authentication Systems
Remote-Access Monitoring
Hands-On Exercises
CHAPTER 3: Understanding Video Surveillance Systems
Video Surveillance Systems
Hands-On Exercises
CHAPTER 4: Understanding Intrusion-Detection and Reporting Systems
Intrusion-Detection and Reporting Systems
Hands-On Exercises
CHAPTER 5: Infrastructure Security: Review Questions and Hands-On Exercises
Summary Points
Security Challenge Scenarios
Review Questions
Exam Questions
PART II: Securing Local Hosts
CHAPTER 6: Local Host Security in the Real World
Security Challenges
Summary
CHAPTER 7: Securing Devices
The Three Layers of Security
Securing Host Devices
Hands-On Exercises
CHAPTER 8: Protecting the Inner Perimeter
The Inner Perimeter
Hands-On Exercises
CHAPTER 9: Protecting Remote Access
Protecting Local Computing Devices
Implementing Local Protection Tools
Using Local Intrusion-Detection Tools
Configuring Browser Security Options
Defending Against Malicious Software
Hardening Operating Systems
Overseeing Application Software Security
Applying Software Updates and Patches
Hands-On Exercises
CHAPTER 10: Local Host Security: Review Questions and Hands-On Exercises
Summary Points
Security Challenge Scenarios
Review Questions
Exam Questions
PART III: Securing Local Networks
CHAPTER 11: Local Network Security in the Real World
Security Challenges
Summary
CHAPTER 12: Networking Basics
Understanding the Basics of Networking
The OSI Networking Model
Data Transmission Packets
OSI Layer Security
Network Topologies
Logical Topologies
Hands-On Exercises
CHAPTER 13: Understanding Networking Protocols
The Basics of Networking Protocols
Network Control Strategies
Hands-On Exercises
CHAPTER 14: Understanding Network Servers
The Basics of Network Servers
Hands-On Exercises
CHAPTER 15: Understanding Network Connectivity Devices
Network Switches
Routers
Gateways
Network Bridges
Wireless Network Connectivity
Hands-On Exercises
CHAPTER 16: Understanding Network Transmission Media Security
The Basics of Network Transmission MEDIA
Transmission Media Vulnerabilities
Hands-On Exercises
CHAPTER 17: Local Network Security: Review Questions
Summary Points
Security Challenge Scenarios
Review Questions
PART IV: Securing the Perimeter
CHAPTER 18: Perimeter Security in the Real World
Security Challenges
Summary
CHAPTER 19: Understanding the Environment
The Basics of Internet Security
Understanding the Environment
Hands-On Exercises
CHAPTER 20: Hiding the Private Network
Understanding Private Networks
Hands-On Exercises
CHAPTER 21: Protecting the Perimeter
Understanding the Perimeter
Firewalls
Network Appliances
Proxy Servers
Demilitarized Zones (DMZs)
Honeypots
Extranets
Hands-On Exercises
CHAPTER 22: Protecting Data Moving Through the Internet
Securing Data in Motion
Cryptography
Hands-On Exercises
CHAPTER 23: Tools and Utilities
Using Basic Tools
Monitoring Tools and Software
Hands-On Exercises
CHAPTER 24: Identifying and Defending Against Vulnerabilities
Zero Day Vulnerabilities
Software Exploits
Social Engineering Exploits
Network Threats and Attacks
Dictionary Attacks
Denial of Service (DoS) Attacks
Spam
Other Exploits
Hands-On Exercises
CHAPTER 25: Perimeter Security: Review Questions and Hands-On Exercises
Summary Points
Security Scenario Review
Review Questions
Exam Questions
APPENDIX A: Glossary
APPENDIX B: Acronyms
APPENDIX C: NIST Preliminary Cybersecurity Framework
INDEX
END USER LICENSE AGREEMENT
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
INTRODUCTION
Next
Next Chapter
CHAPTER 1: Infrastructure Security in the Real World
PART I
Securing the Infrastructure
Chapter 1
Infrastructure Security in the Real World
Chapter 2
Understanding Access Control and Monitoring Systems
Chapter 3
Understanding Video Surveillance Systems
Chapter 4
Understanding Intrusion Detection and Reporting Systems
Chapter 5
Infrastructure Security: Review Questions & Hands-On Exercises
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset